Metadata-Version: 2.1
Name: stegcracker
Version: 2.1.0
Summary: Steganography brute-force utility to uncover hidden data inside files.
Home-page: https://github.com/Paradoxis/StegCracker
Author: Luke Paris (Paradoxis)
Author-email: luke@paradoxis.nl
License: MIT
Description: # StegCracker
        [![Build Status](https://travis-ci.org/Paradoxis/StegCracker.svg?branch=master)](https://travis-ci.org/Paradoxis/StegCracker)
        [![PyPI version](https://badge.fury.io/py/stegcracker.svg)](https://badge.fury.io/py/stegcracker)
        [![codecov](https://codecov.io/gh/Paradoxis/StegCracker/branch/master/graph/badge.svg)](https://codecov.io/gh/Paradoxis/StegCracker)
        [![pulls](https://img.shields.io/docker/pulls/paradoxis/stegcracker.svg)](https://hub.docker.com/r/paradoxis/stegcracker)
        
        Steganography brute-force utility to uncover hidden data inside files. <br>
        Looking for the Docker repository? You can find it [here](https://hub.docker.com/r/paradoxis/stegcracker)
        
        ## Deprecation
        Stop wasting time and CPU, use [stegseek](https://github.com/RickdeJager/stegseek) instead! Not convinced? Look at these benchmarks (stolen with love):
        
        | password    | Line        | Stegseek v0.4 | Stegcracker 2.0.9 | Stegbrute v0.1.1 (-t 8) |
        |-------------|-------------|---------------|-------------------|-------------------------|
        | "cassandra" | 1 000       |          0.9s |              3.1s |                    0.7s |
        | "kupal"     | 10 000      |          0.9s |             14.4s |                    7.1s |
        | "sagar"     | 100 000     |          0.9s |           2m23.0s |                 1m21.9s |
        | "budakid1"  | 1 000 000   |          0.9s | [p]      23m50.0s |                13m45.7s |
        | "␣␣␣␣␣␣␣1"  | 14 344 383  |          1.9s | [p]    5h41m52.5s | [p]          3h17m38.0s |
        
        While I've enjoyed building this tool it is and always will built on bad foundations. StegCracker
        started out as a dirty hack for a problem which didn't have any good or easy to use solutions, it's 
        biggest limiting factor however is that it relies on just spamming thousand of subprocess calls a second
        which (despite being optimized slightly with multiple threads) is just horrible for performance.
        
        So, as a result, after three years of managing the project I've decided to
        [pass on the torch](https://github.com/RickdeJager/stegseek/issues/4) and officially
        retire the project. Thanks for the support and thank you [@RickdeJager](https://github.com/RickdeJager) for building a better version :tada:
        
        ## Usage
        Using stegcracker is simple, pass a file to it as it's first parameter and 
        optionally pass the path to a wordlist of passwords to try as it's second 
        parameter. If you don't specify the wordlist, the tool will try to use the 
        built-in rockyou.txt wordlist which ships with Kali Linux. If you are running a 
        different distribution, you can download the rockyou wordlist 
        [here](https://github.com/danielmiessler/SecLists/raw/master/Passwords/Leaked-Databases/rockyou.txt.tar.gz).
        
        ```
        $ stegcracker <file> [<wordlist>]
        ```
        
        Or using Docker:
        
        ```
        $ docker run -v $(pwd)/data/:/data -it paradoxis/stegcracker example.jpg
        ```
        
        ## Requirements
        The program requires the steghide binary, and Python 3.6 or higher to be installed. If 
        python 3.6 is not installed, check out [this](https://unix.stackexchange.com/questions/332641/how-to-install-python-3-6)
        guide on how to do so. Steghide can be installed by using the following command (Kali Linux):
        
        ```
        $ sudo apt-get install steghide -y
        ```
        
        ## Installation
        To install StegCracker, run the following command:
        
        ```
        $ pip3 install stegcracker
        ```
        
        Or pull the latest docker image:
        
        ```
        $ docker pull paradoxis/stegcracker
        ```
        
        ## Updating
        To update StegCracker, simply pass `-U` to the installation command:
        
        ```
        $ pip3 install stegcracker -U --force-reinstall
        ```
        
        ## Example
        
        ![demo](https://github.com/Paradoxis/StegCracker/raw/master/stegcracker.gif)
         
        ## FAQ / Troubleshooting
        
        * I can't install the tool with `pip3`, but python 3.6+ is installed
            * Your pip binary might be using a different version of Python. Try installing it 
              directly through Python like so (replace "X" with your minor version, eg: `python3.6`): 
              `python3.X -m pip install -U stegcracker`
              
        * I installed the tool, but when I run `stegcracker` it just returns 'command not found'
            * Chances are your Python's `bin` directory is not in your PATH envrionment variable. 
              As a dirty fix you could add the following to your `~/.bashrc` file: `alias stegcracker='python3 -m stegcracker'`
        
        * I'm using StegCracker 1.X, how do I upgrade?
            * If you're upgrading StegCracker from the original 1.X release, please 
              remove the existing version first using: `sudo rm --force $(which stegcracker)`
        
        * I want to run an older version of StegCracker, how do I obtain a copy?
            * While I recommended using the latest and greatest version, you might want 
              to install an older version of StegCracker. You can do this
              by checking out the [releases](https://github.com/Paradoxis/StegCracker/releases) 
              page. _(Note: all issues or pull requests regarding this version will be be ignored)_.
        
        * Can I run this tool on other Linux distro's? 
            * As long as you have a valid version of Python 3.6 and steghide in your path
              it *should* work. Please note that the tool has officially been tested on 
              Kali Linux, all other platforms might be unstable. If you find a bug on 
              another distro, please submit an issue and I'll see what I can do 
              _(but do fill in the template as well)_.
              
        * Can I run StegCracker on Windows?
            * As far as I know there aren't any official steghide releases for Windows, 
            so as far as I'm aware: no
        
        ## License
        Copyright 2020 - Luke Paris (Paradoxis)
        
        Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, 
        including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to 
        do so, subject to the following conditions:
        
        The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
        
        THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
        NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF 
        OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Platform: UNKNOWN
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Requires-Python: >=3.6.0
Description-Content-Type: text/markdown
Provides-Extra: dev
Provides-Extra: test
